General

  • Target

    07112023_2240_27c9f60aaba81.zip

  • Size

    65KB

  • Sample

    231107-r1xlyabf57

  • MD5

    88424ee9bb150b071c277b6c3e0ebc66

  • SHA1

    4d27d988318c5774642c7f6ac8c5259a85afb797

  • SHA256

    9fc091851a420204b53e5a02e7a9d41c653f8d67e0cb792b90b56ce27667cbce

  • SHA512

    00ea7e5d4bca424a52883e5df790d19788ff79c62594d98c38e5dc99d1da18596fdb647e558f18caced077efd1647684b46085a98b34d2399de7c50b62ec8e4f

  • SSDEEP

    1536:xDJVRmoh2G3oIh6a62eUePP1ZueowjaavwI/C/4m0BHEV5zbu:phJTTSPzuI60C/43Bsxbu

Malware Config

Extracted

Family

darkgate

Botnet

user_871236672

C2

http://8sjimonstersboonkonline.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    2351

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    BXQcSgVDRBHnbn

  • internal_mutex

    txtMut

  • minimum_disk

    43

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    user_871236672

Targets

    • Target

      27c9f60aaba81.js

    • Size

      252KB

    • MD5

      5780dea262044531b19f3194408aad91

    • SHA1

      a2579952eedec5ec649f589c1e797c91a05eaf93

    • SHA256

      eccf555cc4f3293e850fc35377a06d69f04b81192f3f27b645bc4cfb23fc085d

    • SHA512

      e45f5351921016ff87e6d81cc1eaade7c88324f847ec37dd60d08bc4830ebe6fb6b00f9623d3438d03c48236f091fff19f239face730ddfa2c9ea6640adc55c3

    • SSDEEP

      6144:Ye7hgXeerjqlI2Iro+/e7hgXeerjqlI2Iro+8:YIhgSlI234IhgSlI23V

    • DarkGate

      DarkGate is an infostealer written in C++.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks